While even the most effective information governance programs may not be sufficient to defeat sophisticated attacks on an organization’s network, they can mitigate the extent of the damage and limit risks and potential liability.

The increasing use of third-party file-hosting services raises at least three questions worth considering in crafting a privacy and cyber security policy that both confronts this reality and protects valuable corporate information.

Data collection tools are the same as those in a standard IT environment, but the methodology used to retrieve the data differs from a more standard collection, in that the organization must choose between two basic approaches.